First published: Wed Apr 23 2008(Updated: )
Buffer overflow in InspIRCd before 1.1.18, when using the namesx and uhnames modules, allows remote attackers to cause a denial of service (daemon crash) via a large number of channel users with crafted nicknames, idents, and long hostnames.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
InspIRCd | <=1.1.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1925 is classified as a high severity vulnerability due to its potential to crash the server, resulting in denial of service.
To fix CVE-2008-1925, upgrade InspIRCd to version 1.1.18 or later, which addresses this buffer overflow issue.
CVE-2008-1925 allows remote attackers to exploit the buffer overflow, potentially crashing the IRC daemon and disrupting service.
CVE-2008-1925 affects all versions of InspIRCd prior to 1.1.18.
CVE-2008-1925 specifically involves the namesx and uhnames modules, which are used for handling user nicknames and hostnames.